View Reports Ad Account for Any Business (Export via Report ID)
Using report ID access, an attacker could export Ads Manager reports for arbitrary businesses.
Using report ID access, an attacker could export Ads Manager reports for arbitrary businesses.
Partner businesses with analyst role could escalate to pixel editor via the sharing_agreement endpoint.
Partner businesses with limited 'apply block list' role could escalate to manage/delete block lists via an insecure add/connections endpoint.
The vulnerability permits an unauthenticated actor to takeover any wit.ai account. The only prerequisite observed is knowledge of the target wit.ai identifier; no additional credentials are required.
Preview parameter allowed unauthorized viewing of draft, archived, and inactive Spark AR effects for any user.
Users without page roles could delete AR Studio Effect groups, removing other users and disrupting creators workflows.
In September 2020, a vulnerability was discovered in Facebook's Rooms feature inside Groups that allowed attackers to disclose members of private groups through unauthenticated GraphQL requests.
The vulnerability permits an unauthenticated actor to takeover any wit.ai account. The only prerequisite observed is knowledge of the target wit.ai identifier; no additional credentials are required.
A GraphQL endpoint exposed pending (unconfirmed) email addresses for Oculus users by ID, leaking PII.